Cryptography literally means "The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient". and Quantum word is related with "Light". Thus, Quantum Cryptography is a way of descripting any information in the form of quantum particles. There are no classical cryptographic systems which are perfectly secure. In contrast to Classical cryptography which depends upon Mathematics, Quantum Cryptography utilizes the concepts of Quantum Physics which provides us the security against the cleverest marauders of the present age. In the view of increasing need of Network and Information Security, we do require methods to overcome the Molecular Computing technologies (A future technology) and other techniques of the various codebrakers. Both the parts i.e. Quantum Key distribution and Information transference from Sender to Receiver are much efficient and secure. It is based upon BB84 protocol. It can be of great use for Govt. agencies such as Banks, Insurance, Brokerages firms, financial institutions, e-commerce and most important is the Defense & security of any country. It is a Cryptographic communication system in which the original users can detect unauthorized eavesdropper and in addition it gives a guarantee of no eavesdropping. It proves to be the ultra secure mode of communication b/w two intended parties.
Deep Dive into Key distribution in PKC through Quantas.
Cryptography literally means “The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient”. and Quantum word is related with “Light”. Thus, Quantum Cryptography is a way of descripting any information in the form of quantum particles. There are no classical cryptographic systems which are perfectly secure. In contrast to Classical cryptography which depends upon Mathematics, Quantum Cryptography utilizes the concepts of Quantum Physics which provides us the security against the cleverest marauders of the present age. In the view of increasing need of Network and Information Security, we do require methods to overcome the Molecular Computing technologies (A future technology) and other techniques of the various codebrakers. Both the parts i.e. Quantum Key distribution and Information transference from Sender to Receiver are much efficient and secure. It is based upon BB84 pr
(1). Introduction to Quantum Cryptography: Quantum Cryptography provides a completely secure way to solve the problem of Key Distribution and to transmit any message data safely. It utilizes the Rule of Quantum Physics [8] i.e. "Heisenberg uncertainty Principle", according to which measuring a quantum particle in general disturbs it and yields incomplete information about its state before the measurement. Generally, the quantum Particles used is a short burst of light called as the Photons because their behavior is comparatively well-understood as well as they can be sent through a fiber optic cable rather easily which is the most suitable medium for !" # $ %& $ '& ( %)') 123 extremely high-bandwidth communications. Also a photon has a property called polarization and that property can be measured. The polarization of a particle is the direction in which the wave is oscillating or the angle of the vibration is known as the polarization of the photon. [2] [7] The polarization can be measured either rectilinearly (UP/DOWN {90 0 }, LEFT/RIGHT {0 0 }) or diagonally (UPLEFT/RIGHTDOWN {135 0 } and UPRIGHT/LEFTDOWN {45 0 }). These are two bases of measurement i.e. Rectilinear and Diagonal. Each bit of the data to be transferred will be in the form of a photon of the light. Eavesdropping on a quantum communication channel therefore causes an unavoidable disturbance, alerting the genuine/original users. This key can then be used with any chosen encryption algorithm to encrypt (and decrypt) a message. The algorithm most commonly associated with QKD is the one time pad, as it is secure when used with a secret, random key. Quantum cryptography has limitations like the photon keys can travel only between computers directly connected through fiber-optic lines (as opposed to networked systems), and the photons degenerate over long distances but with the advancements in technology they are assumed to fade dim. E91 protocol [11][12]-Relies on EPR entanglement uses Bell's Inequality and quantum entanglement. It was developed by Artur Ekert.
B92 [13]-Similar to BB84 but only uses two polarization states.
Interference phase drift -This protocol uses the mechanism of interference to ensure security. Eavesdropping would cause any interference to be destroyed, and so can be detected.
Bennett and Brassard presented the working procedure of Quantum Cryptography in 1984 commonly known as BB84 protocol after its inventors
124 and year of publication, but the full implementation of the above was done in 1989 at the Thomson J. Watson Research Center of IBM in Yorktown Heights, New York, USA. It has been demonstrated for a distance of 30 Kms over a fiber optic link and for a distance of 100 mts using air as a media.
According to this Protocol, It uses two channels, one quantum and one simple. It is assumed that three people are involved Sender of the information, Receiver and eavesdropper who wants to listen or to crack the information exchange between the Sender and Receiver. He also can easily see and hear everything that takes place over the 2 nd insecure channel. All three have access to both channels but not to each other’s computers. Eavesdropper cannot corrupt information on the public channel and he cannot break the laws of physics. However he is assumed to have unlimited computing power. In order to send an encrypted message Sender first communicates her intent with Receiver. He then sends the Key which will be the mode for encrypting the message data.
Key is sent in the form of stream of individual photons provided each bit can have value either 1 or 0, through the quantum channel. However, in addition to their linear travel, all of these photons are oscillating (vibrating) in a certain manner. As explained earlier, Oscillations here are assumed to be of four types such as at 0 0 , 45 0 , 90 0 or 135 0 . A polarizer is simply a filter that permits photons to pass through it with any angle out of four explained oscillations. Sender has a polarizer that can transmit the photons in any one of the four states mentioned. It totally depend upon the orientation of the polarizer that either it is a Rectilinear or Diagonal polarizer. Also Sender swaps his polarization scheme between rectilinear and diagonal filters for the transmission of each single photon bit in a random manner so that a continuous altering stream of bits are created. In doing so, the transmission can have one of two polarizations represent a single bit, either 1 or 0, in either scheme she uses. He records this random sequence. In the Diagram shown above, every photon (acting as a bit) may be assigned either as 0 or 1. (Refer to the Diagram below.) [7] !" # $ %& $ ‘& ( %)’)
When receiving the photon key, Receiver must choose to measure each photon bit using
126 either his rectilinear or diagonal polarizer: sometimes he will choose the correct polarizer and at other times he will choose the wrong one. Like Sender, he selects each polarizer in a random manner.
…(Full text truncated)…
This content is AI-processed based on ArXiv data.